CVE-2022-45636
📋 TL;DR
This vulnerability allows attackers to unlock MEGAFEIS and BOFEI DBD+ smart locks without authorization by sending arbitrary API requests to the mobile application. It affects users of the MEGAFEIS/BOFEI DBD+ mobile apps for iOS and Android. The flaw stems from an insecure authorization scheme in the API implementation.
💻 Affected Systems
- MEGAFEIS DBD+ Mobile Application
- BOFEI DBD+ Mobile Application
📦 What is this software?
Bofei Dbd\+ by Megafeis
Bofei Dbd\+ by Megafeis
⚠️ Risk & Real-World Impact
Worst Case
Attackers could unlock any vulnerable smart lock remotely, potentially enabling physical theft, unauthorized access to secured areas, or safety hazards.
Likely Case
Attackers with network access to the mobile app's API endpoints could unlock specific smart locks without proper authentication.
If Mitigated
With proper API authorization controls, only authenticated users with appropriate permissions could unlock devices.
🎯 Exploit Status
The WithSecure Labs disclosure includes technical details that could be used to create exploit tools. The attack requires understanding of the API structure but doesn't need advanced technical skills.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found in provided references
Restart Required: No
Instructions:
1. Check for app updates in Apple App Store or Google Play Store. 2. Update to the latest version if available. 3. Contact MEGAFEIS/BOFEI support for patch information.
🔧 Temporary Workarounds
Disable Remote Access
allTemporarily disable the mobile app's ability to unlock devices remotely
Network Segmentation
allRestrict network access to the mobile app's API endpoints
🧯 If You Can't Patch
- Discontinue use of the vulnerable mobile application for unlocking devices
- Implement physical security controls as backup for affected smart locks
🔍 How to Verify
Check if Vulnerable:
Check if you're using MEGAFEIS/BOFEI DBD+ mobile app version 1.4.4 or earlier. Review app permissions and API communication patterns.
Check Version:
Check app version in mobile device settings: iOS Settings > General > iPhone Storage > [App Name]; Android Settings > Apps > [App Name] > App Info
Verify Fix Applied:
Verify app version is updated beyond v1.4.4. Test unlocking functionality with proper authentication requirements.
📡 Detection & Monitoring
Log Indicators:
- Unusual API requests to lock/unlock endpoints
- Failed authentication attempts followed by successful unlocks
- API requests without proper authorization headers
Network Indicators:
- Unencrypted or weakly authenticated API calls to smart lock services
- Traffic to known vulnerable API endpoints
SIEM Query:
source="mobile_app_logs" AND (event="unlock" OR event="lock") AND auth_status="failed" AND result="success"
🔗 References
- https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636
- https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co
- https://github.com/WithSecureLabs/megafeis-palm/tree/main/CVE-2022-45636
- https://labs.withsecure.com/advisories/insecure-authorization-scheme-for-api-requests-in-dbd--mobile-co